Recon Methods Part 4 – Automated OSINT
By Red Siege | April 1, 2020
In the first three parts of this series, we learned about manual methods for gathering intelligence about a target company, their external hosts, and their employees manually through a myriad […]
Learn MoreRecon Methods Part 3 – OSINT Employee Discovery
By Red Siege | February 27, 2020
In the first part of this series, we explored options we typically use to discover domain names, subdomains, available services on those hosts, historical data on the target, and indicators […]
Learn MoreRecon Methods Part 2 – OSINT Host Discovery Continued
By Red Siege | February 19, 2020
In part 1, we discussed how to start with a target’s name and research a company’s history through Wikipedia, gain information about external hosts with DNSDumpster, and continue host discovery […]
Learn MoreRecon Methods Part 1 – OSINT Host Discovery
By Red Siege | February 4, 2020
During an external assessment (be it a penetration test or red team), we here at Red Siege begin by investigating the target as completely as possible before accessing the target’s […]
Learn MoreOpen Source Intelligence Through Messaging Apps
By Red Siege | August 19, 2019
During red team engagements, we try to gather information about our targets as quietly as possible. One piece of information that can be difficult to find is employee cell phone […]
Learn More